Front cover image for PoC GTFO

PoC GTFO

Manul Laphroaig (Author)
"This highly anticipated print collection gathers articles published in the much-loved International Journal of Proof-of-Concept or Get The Fuck Out. PoC GTFO follows in the tradition of Phrack and Uninformed by publishing on the subjects of offensive security research, reverse engineering, and file format internals. Until now, the journal has only been available online or printed and distributed for free at hacker conferences worldwide. Consistent with the journal's quirky, biblical style, this book comes with all the trimmings: a leatherette cover, ribbon bookmark, bible paper, and gilt-edged pages. The book features more than 80 technical essays from numerous famous hackers, authors of classics like "Reliable Code Execution on a Tamagotchi," "ELFs are Dorky, Elves are Cool," "Burning a Phone," "Forget Not the Humble Timing Attack," and "A Sermon on Hacker Privilege." Twenty-four full-color pages by Ange Albertini illustrate many of the clever tricks described in the text."
eBook, English, 2017
No Starch Press, San Francisco, 2017
1 online resource : illustrations
9781593278984, 1593278985
1005903587
Print version:
Intro
Title Page
Copyright Page
Contents
Introduction
Chapter 0: A CFP with POC
0:1 Let us begin!
0:2 iPod Antiforensics
0:3 ELFs are dorky, Elves are cool
0:4 Epistle to Hats of All Colors
0:5 Returning from ELF to Libc
0:6 GTFO or #FAIL
Chapter 1: Proceedings of the Society of PoC∥GTFO
1:1 Lend me your ears!
1:2 RNG in four lines of Javascript
1:3 Serena Butler's TV Typewriter
1:4 Making a Multi-Windows PE
1:5 This ZIP is also a PDF
1:6 Burning a Phone
1:7 Sermon on the Divinity of Languages
Chapter 2: The Children's Bible Coloring Book of PoC∥GTFO
2:1 Ring them Bells!
2:2 Build your own birdfeeder
2:3 A PGP Matryoshka Doll
2:4 Code Execution on a Tamagotchi
2:5 Shellcode for MSP430
2:6 Calling putchar() from ELF
2:7 POKE of Death for the TRS 80/M100
2:8 This OS is also a PDF
2:9 A Vulnerability in Reduced Dakarand
2:10 Juggernauty
Chapter 3: Address on the Smashing of Idols to Bits and Bytes
3:1 Fear Not!
3:2 Greybeard's Luck
3:3 This PDF is a JPEG
3:4 Netwatch for SMM
3:5 Packet-in-Packet Mitigation Bypass
3:6 An RDRAND Backdoor in Bochs
3:7 Kosher Firmware for the Nokia 2720
3:8 Tetranglix Boot Sector
3:9 Defusing the Qualcomm Dragon
3:10 Tales of Python's Encoding
3:11 Angecryption
Chapter 4: Tract de la Société Secrète
4:1 Let me tell you a story
4:2 Epistle on the Bountiful Seeds of 0Day
4:3 This OS is a Boot Sector
4:4 Prince of PoC
4:5 New Facedancer Framework
4:6 Power Glitching Tamagotchi
4:7 A Plausibly Deniable Cryptosystem
4:8 Hardening Pin Tumbler Locks
4:9 Intro to Chip Decapsulation
4:10 Forget Not the Humble Timing Attack
4:11 This Truecrypt is a PDF
4:12 How to Manually Attach a File to a PDF
4:13 Ode to ECB
Chapter 5: Address to the Inhabitants of Earth. 5:1 It started like this
5:2 A Sermon on Hacker Privilege
5:3 ECB: Electronic Coloring Book
5:4 An Easter Egg in PCI Express
5:5 A Flash PDF Polyglot
5:6 This Multiprocessing OS is a Boot Sector
5:7 A Breakout Board for Mini-PCIe
5:8 Prototyping a generic x86 backdoor in Bochs
5:9 Your Cisco blade is booting PoC∥GTFO
5:10 I am my own NOP Sled
5:11 Abusing JSONP with Rosetta Flash
5:12 Sexy collision PoCs
5:13 Ancestral Voices
Chapter 6: Old Timey Exploitation
6:1 Communion with the Weird Machines
6:2 On Giving Thanks
6:3 Gekko the Dolphin
6:4 This TAR archive is a PDF!
6:5 x86 Alchemy and Smuggling
6:6 Detecting MIPS Emulation
6:7 More Cryptographic Coloring Books
6:8 PCB Reverse Engineering
6:9 Davinci Seal
6:10 Observable Metrics
Chapter 7: PoC∥GTFO, Calisthenics and Orthodontia
7:1 With what shall we commune this evening?
7:2 The Magic Number: 0xAA55
7:3 Coastermelt
7:4 The Lysenko Sermon
7:5 When Scapy is too high-level
7:6 Abusing file formats
7:7 AES-NI Backdoors
7:8 Innovations with Linux core files
7:9 Bambaata speaks from the past
7:11 Cyber Criminal's Song
Chapter 8: Exploits Sit Lonely on the Shelf
8:1 Please stand
now, please be seated
8:2 Witches, Warlocks, and Wassenaar
8:3 Compiler Bug Backdoors
8:4 A Protocol for Leibowitz
8:5 Jiggling into a New Attack Vector
8:6 Hypervisor Exploit, Five Years Old
8:7 Stegosploit
8:8 On Error Resume Next
8:9 Unbrick My Part
8:10 Backdoors up my Sleeve
8:11 Naughty Signals
8:12 Weird Crypto
Useful Tables
Index
Colophon
Footnotes
Introduction
Chapter 0: A CFP with POC
Chapter 1: Proceedings of the Society of PoC∥GTFO
Chapter 2: The Children's Bible Coloring Book of PoC∥GTFO. Chapter 3: Address on the Smashing of Idols to Bits and Bytes
Chapter 4: Tract de la Société Secrète
Chapter 5: Address to the Inhabitants of Earth
Chapter 6: Old Timey Exploitation
Chapter 7: PoC∥GTFO, Calisthenics and Orthodontia
Chapter 8: Exploits Sit Lonely on the Shelf
"These are the collected works of the International Journal of Proof or Concept or Get the Fuck Out ..."--Introduction
Includes index